Sales: 1.844.224.6069 | Support: 1.844.728.7949

Last Updated on March 20, 2026 by Matthew Goodchild

The CG Tech Brief — Q2 2026 | CG Technologies
The CG Tech Brief

Q2 2026: Employee Best Practices & CG's Cloudtango Recognition

Short, actionable updates on what we're seeing across the IT and cybersecurity landscape — along with real-world examples of how we help businesses strengthen security, reduce risk, and improve system performance.

Q2 2026 CG Technologies 4 min read

5 Technology Habits Every Employee Should Follow

As part of our ongoing effort to keep your systems secure and running smoothly, here are five best practices all employees should follow. These guidelines reduce common risks, improve reliability, and help ensure a consistent experience across your environment.

While many of these may seem routine, they play an important role in preventing security incidents and minimizing disruptions to day-to-day work.

  • 1

    Use Strong, Unique Passwords

    Avoid reusing passwords across multiple systems. Use a combination of letters, numbers, and symbols — or better yet, long passphrases (multiple random words) that are easier to remember and harder to crack. Consider a password manager to keep track of them securely. Never share your passwords with others.

    Reference

    How Safe Is Your Password?

    Estimated time for a computer to crack a password by length and complexity
    Characters Lowercase only + Uppercase + Number + Symbol
    1–6InstantlyInstantlyInstantlyInstantly
    7InstantlyInstantly1 min6 min
    8Instantly22 min1 hr8 hrs
    92 min19 hrs3 days3 wks
    101 hr1 mth7 mths5 yrs
    111 day5 yrs41 yrs400 yrs
    123 wks300 yrs2,000 yrs34,000 yrs
    Source: Security.org via Statista
  • 2

    Enable Multi-Factor Authentication

    Whenever available, MFA adds an extra layer of protection by requiring a second verification step — a mobile app prompt, text message, or hardware token. Even if your password is compromised, MFA significantly reduces the risk of unauthorized access. Always approve prompts only when you are actively signing in.

  • 3

    Keep Devices Updated

    Regular updates ensure your system has the latest security patches. Allow updates to install when prompted, or restart your device regularly. Delaying updates leaves your device exposed to known vulnerabilities — this applies to operating systems, browsers, and all installed applications.

  • 4

    Use Secure Networks

    Avoid accessing company systems over public Wi-Fi (coffee shops, airports). These networks are often unsecured and can expose your data. If you must connect remotely, always use a VPN to encrypt your traffic. At home, ensure your Wi-Fi uses a strong password and modern encryption (WPA2 or WPA3).

  • 5

    Store Files in Approved Locations

    Save work files in company-approved platforms — shared drives or sanctioned cloud storage — to ensure proper backup, version control, and access management. Avoid storing important data locally on your device or using personal storage services. This prevents data loss and ensures your team can access files when needed.

What's on the Horizon for the Rest of 2026

As technology continues to evolve, we're seeing a growing focus on AI-driven tools, increased cybersecurity risks, and more complex cloud environments. These changes bring both opportunities and new challenges for organizations.

  • Strengthening security controls, including phishing protection and account security across all client environments.
  • Improving visibility across systems and devices to detect issues before they become incidents.
  • Supporting users with tools and guidance to work more efficiently and securely as AI-driven workflows become mainstream.

We'll continue sharing additional tips and updates to help you stay informed and prepared. As always, if something doesn't look right or you have questions, reach out to us.

CG Technologies Named to Cloudtango MSP Select 2026

We're pleased to share that CG Technologies has been recognized on Cloudtango's MSP Select 2026, a list highlighting top-performing managed service providers across Canada.

Named on
Cloudtango
MSP Select
Canada  ·  2026

This recognition reflects our continued focus on delivering reliable IT services, maintaining strong customer satisfaction, and supporting clients through an increasingly complex technology landscape.

Cloudtango's MSP Select evaluates providers based on technical expertise, innovation, and customer outcomes. Being included on this list reinforces our commitment to providing practical, effective solutions that help businesses operate securely and efficiently.

As organizations rely more heavily on cloud platforms, multi-vendor environments, and AI-driven tools, the need for resilient and secure IT infrastructure continues to grow — as do the cybersecurity threats that come with it. We appreciate the trust our clients place in us and will continue delivering consistent, high-quality IT support.

Proactive IT & Cybersecurity That Scales With Your Business

Get in Touch
Get In Touch
We believe that IT shouldn’t be a pain for you.